Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 10:46
Static task
static1
Behavioral task
behavioral1
Sample
183cc5406314f67b15a424162da1e431.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
183cc5406314f67b15a424162da1e431.exe
Resource
win10v2004-20231222-en
General
-
Target
183cc5406314f67b15a424162da1e431.exe
-
Size
208KB
-
MD5
183cc5406314f67b15a424162da1e431
-
SHA1
a6dc2b382023ccac71f87bfc3e80b013b0fd458f
-
SHA256
ec073d73d54a52d889115abe7a08088f2fe16c0cf1186078b43a0f79a6db155c
-
SHA512
a3437e66c622c07ca0bb6aaf1bea4ce7160bcf97976be84fef41cae8d5815b7f055765e5ac73c2b022e1f33b88261a5faa795597df1ad2ebb06384ad4e950582
-
SSDEEP
3072:8VHgCc4xGvbwcU9KQ2BBAHmaPxiVoIb5ET:5Cc4xGxWKQ2Bonxb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2280 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 2020 183cc5406314f67b15a424162da1e431.exe 2020 183cc5406314f67b15a424162da1e431.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\334bc1a9\334bc1a9 183cc5406314f67b15a424162da1e431.exe File created C:\Program Files (x86)\334bc1a9\jusched.exe 183cc5406314f67b15a424162da1e431.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Update23.job 183cc5406314f67b15a424162da1e431.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2280 2020 183cc5406314f67b15a424162da1e431.exe 28 PID 2020 wrote to memory of 2280 2020 183cc5406314f67b15a424162da1e431.exe 28 PID 2020 wrote to memory of 2280 2020 183cc5406314f67b15a424162da1e431.exe 28 PID 2020 wrote to memory of 2280 2020 183cc5406314f67b15a424162da1e431.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\183cc5406314f67b15a424162da1e431.exe"C:\Users\Admin\AppData\Local\Temp\183cc5406314f67b15a424162da1e431.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files (x86)\334bc1a9\jusched.exe"C:\Program Files (x86)\334bc1a9\jusched.exe"2⤵
- Executes dropped EXE
PID:2280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD5134c1d489094d6d3399f65b0e9aebc1f
SHA1612a57fbe6ed3ab9c15b39451171d813314a28d5
SHA25654f9150d1268f7b4b83dd9fc3ec32274bf749715a5806ff3ca5262f5427d6781
SHA512b09bf60e4850d05261d81a124a647dd111f42480224eae8a3bd2f64736c38119953703f868ad34194a7ae6dad6aabff4081ba73df262bbe9f5327867c56a48ed
-
Filesize
208KB
MD5bc4ae47d6aa4e73287ba4d36810aa830
SHA130affefd785ebc5d1ab51b749669a06e8f107bb6
SHA256006f2cd2e2ac0a5d2b7a1fd6f56b6a4af8dc7e6c400f881750bc30277323b7a8
SHA512c7b5fbfa3c81e066fc00a9d8216dd19ee845a900d74c2c2f44f3d9ff6ace11e242ff8845c162dce6e4e0db3f7137b607fde19f5854e0fe9545c5d142bb3476a2